Results 1 to 10 of about 51,048 (345)
CRoSS: Diffusion Model Makes Controllable, Robust and Secure Image Steganography [PDF]
Current image steganography techniques are mainly focused on cover-based methods, which commonly have the risk of leaking secret images and poor robustness against degraded container images. Inspired by recent developments in diffusion models, we discovered that two properties of diffusion models, the ability to achieve translation between two images ...
Jiwen Yu+3 more
arxiv +3 more sources
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats [PDF]
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.
Caviglione, Luca+3 more
core +2 more sources
A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks
The security of image steganography is an important basis for evaluating steganography algorithms. Steganography has recently made great progress in the long-term confrontation with steganalysis.
Donghui Hu+4 more
semanticscholar +3 more sources
Retransmission Steganography Applied [PDF]
This paper presents experimental results of the implementation of network steganography method called RSTEG (Retransmission Steganography). The main idea of RSTEG is to not acknowledge a successfully received packet to intentionally invoke retransmission. The retransmitted packet carries a steganogram instead of user data in the payload field.
Wojciech Mazurczyk+2 more
openalex +4 more sources
RoSteALS: Robust Steganography using Autoencoder Latent Space [PDF]
Data hiding such as steganography and invisible watermarking has important applications in copyright protection, privacy-preserved communication and content provenance.
Tu Bui+3 more
semanticscholar +1 more source
Large-Capacity and Flexible Video Steganography via Invertible Neural Network [PDF]
Video steganography is the art of unobtrusively concealing secret data in a cover video and then recovering the secret data through a decoding protocol at the receiver end.
Chong Mou+5 more
semanticscholar +1 more source
Eigenfaces-Based Steganography [PDF]
In this paper we propose a novel transform domain steganography technique—hiding a message in components of linear combination of high order eigenfaces vectors. By high order we mean eigenvectors responsible for dimensions with low amount of overall image variance, which are usually related to high-frequency parameters of image (details).
Tomasz Hachaj+2 more
openaire +4 more sources
Generative Steganography Network [PDF]
Steganography usually modifies cover media to embed secret data. A new steganographic approach called generative steganography (GS) has emerged recently, in which stego images (images containing secret data) are generated from secret data directly ...
Ping Wei+5 more
semanticscholar +1 more source
Video steganography: recent advances and challenges
Video steganography approach enables hiding chunks of secret information inside video sequences. The features of video sequences including high capacity as well as complex structure make them more preferable for choosing as cover media over other media ...
Jayakanth Kunhoth+3 more
semanticscholar +1 more source
Perfectly Secure Steganography Using Minimum Entropy Coupling [PDF]
Steganography is the practice of encoding secret information into innocuous content in such a manner that an adversarial third party would not realize that there is hidden meaning.
C. S. D. Witt+4 more
semanticscholar +1 more source